Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
575109c0bec987e4bf63eefb5995c681.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
575109c0bec987e4bf63eefb5995c681.exe
Resource
win10v2004-20231222-en
General
-
Target
575109c0bec987e4bf63eefb5995c681.exe
-
Size
330KB
-
MD5
575109c0bec987e4bf63eefb5995c681
-
SHA1
cb7f1acb90d98c335c03dec48f6d645cc2157f80
-
SHA256
293b7868792a555366eb10a77515d017adcd831460ca8e3e95afce15c865122c
-
SHA512
85c637017475882052f55d53a98e83d0b6b912446dbcb8ec2037b8853ba690e754ea00e8c593edaf70fff3e9a4dd523f9ce4cf4e504f62b388533e4d67997707
-
SSDEEP
6144:Cvt0lw7vH4M5HDneTSI5la+9sn+X6/IGC94OP8W5HDneTSI5la+9sn2:MKO5SmyxX6bC/5SmyJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2016 575109c0bec987e4bf63eefb5995c681.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 575109c0bec987e4bf63eefb5995c681.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1180 575109c0bec987e4bf63eefb5995c681.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1180 575109c0bec987e4bf63eefb5995c681.exe 2016 575109c0bec987e4bf63eefb5995c681.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2016 1180 575109c0bec987e4bf63eefb5995c681.exe 21 PID 1180 wrote to memory of 2016 1180 575109c0bec987e4bf63eefb5995c681.exe 21 PID 1180 wrote to memory of 2016 1180 575109c0bec987e4bf63eefb5995c681.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\575109c0bec987e4bf63eefb5995c681.exe"C:\Users\Admin\AppData\Local\Temp\575109c0bec987e4bf63eefb5995c681.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\575109c0bec987e4bf63eefb5995c681.exeC:\Users\Admin\AppData\Local\Temp\575109c0bec987e4bf63eefb5995c681.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330KB
MD577c8c106249996002a9c03d1b1b76bda
SHA1caae56fc5240c027d5f6d3de65161b1ef057e599
SHA256dd3aa96985a2798418b465064b359d7a037d772597a6687f7655c7d67e7cfcef
SHA5121df889365441e45777159a86f4ff6199f2b8fdf05d5fd2a4de7c547274a9beb70e3cb9b4bd31b19485c36f9d06d1a5ba51e95d34a4d2dee5420047555e0a9175